Quick Tips 5 Flashcards
A BLANK is carried out by gathering data pertaining to how something works and using that data to attack it or crack it, as in differential power analysis or electromagnetic analysis.
side channel attack
BLANK takes place when a user gains too much access rights and permissions over time.
Authorization creep
BLANK is a single sign-on technology developed to address issues in Kerberos. It is based upon public key cryptography (asymmetric) and uses privileged attribute servers and certificates.
SESAME
Security information and event management implements BLANK functionality to be carried out on centralized logs for situational awareness capabilities.
data mining and analysis
BLANK are either host or network based and provide behavioral (statistical) or signature (knowledge) types of functionality.
Intrusion detection systems
Phishing is a type of social engineering attack. If it is crafted for a specific individual, it is called BLANK. If a DNS server is poisoned and points users to a malicious website, this is referred to as BLANK.
spear-phishing, pharming
A web portal is commonly made up of BLANK, which are pluggable user interface software components that present information and services from other systems.
portlets
The BLANK allows for the automation of user management (account creation, amendments, revocation) and access entitlement configuration related to electronically published services across multiple provisioning systems.
Service Provisioning Markup Language (SPML)
The BLANK allows for the exchange of authentication and authorization data to be shared between security domains.
Security Assertion Markup Language (SAML)
The BLANK is a protocol specification for exchanging structured information in the implementation of web services and networked environments.
Simple Object Access Protocol (SOAP)
BLANK environments allow for a suite of interoperable services to be used within multiple, separate systems from several business domains.
Service oriented architecture (SOA)
BLANK is a technology that provides data communication through the use of radio waves.
Radio-frequency identification (RFID)
BLANK identifies potential threats and attack vectors. BLANK identifies weaknesses and lack of countermeasures.
Threat modeling, Vulnerability analysis